Secunia Security Advisory - Some security issues have been reported in Joomla!, which can be exploited by malicious people to disclose version information and by malicious users to manipulate certain data.
cbe3a143f3481bc7c1567c10c135d7054f762eb564efd5a942c8854a0ff0932e
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Joomla! Article Manipulation and Version Information Disclosure
SECUNIA ADVISORY ID:
SA37262
VERIFY ADVISORY:
http://secunia.com/advisories/37262/
DESCRIPTION:
Some security issues have been reported in Joomla!, which can be
exploited by malicious people to disclose version information and by
malicious users to manipulate certain data.
1) An error in the handling of XML files can be exploited to view
version information installed modules.
2) An unspecified error in the application can be exploited to
replace front page articles of another user.
The security issues are reported in versions prior to 1.5.15.
SOLUTION:
Update to version 1.5.15.
Restrict access to XML files (e.g. via an ".htaccess" file).
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits WHK and Gergo Erdosi.
2) The vendor credits Hannes Papenberg.
ORIGINAL ADVISORY:
1)
http://developer.joomla.org/security/news/306-20091103-core-xml-file-read-issue.html
2)
http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------